How to be Invisible Online (and the hard truth about it)...

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
- [Occupy the Web] As a matter of fact, you know, being in the US makes it somewhat more challenging to be too anonymous because we have the NSA who has their fingers into every transaction. So all you NSA people out there who're watching this video, we know. We know what you're doing. And... (laughs) So that was episode one and this is an important lesson. And Elliot says, "Whoever controls the final hop on the network, controls the traffic." - The onion rooting protocol, it's not as anonymous as you think it is. Whoever's in control of the exit nodes is also in control of the traffic, which makes me the one in control. - [Occupy the Web] And that's the same thing that the NSA knows, is that they know whoever controls the final hop controls the network. You know, from my experience of dealing with all of these young people, that's like their ultimate goal, is to be able to hack their neighbor's wifi, right? - [David] Yeah. - [Occupy the Web] That's why they all want those wifi, they wanna get the wifi of the neighbors. And they think also that, maybe we should throw this in here, is that they think that if they use their neighbor's IP address that they're safe. - So joking aside, 'cause obviously we don't recommend that, would using your neighbor's wifi actually keep you safe? - [Occupy the Web] You know, a lot of people believe that if they use their neighbor's wifi, that they're gonna be safe because the IP address is going to be, show that the neighbor was on that website. Many years ago, I was working with an investigator for, I think he was with the Navy at the time. He was what they call the Naval Criminal Investigation Unit. And he and I were talking and he said to me, "That doesn't work." And I said, "Why not?" He says, "Because whenever there's a crime committed, the first, and it's clear that the people whose home wifi did not commit the crime, the first thing we do is we start knocking on the doors of everybody within a few houses. And 100% of the time," 100% of the time is what he said. I'm not saying this, he said it. He said, "100% of the time, we will find the person who committed the crime within a few houses," all right? - Wow! - [Occupy the Web] So he says... And I said, "A hundred percent of the time?" He goes, "Yes, 100% of the time." Even though it's possible to be able to pick up wifi, in some circumstances with special yagi antennas and what have you, you can pick up wifi for a little or two, all right? But hackers, because they're people who think that they can get away with a crime by using their neighbors, they almost always get caught because they are using the next door neighbors or the person two or three houses down. And then, law enforcement just has to go knocking on doors and asking questions. I was surprised when he told me that, and he said "100% of the time." And so since that, this is over 10 years ago, I've kind of checked the cases, and he's right. 100% of the time the person is right next door, or right behind the house, or in the same apartment building. - Hey, everyone, it's David Bombal, back with Occupy the Web. It's been too long since our last interview. So glad to have him back. Occupy the Web, welcome. - [Occupy the Web] Thanks, David. It's always good to be back on the best IT cybersecurity channel on YouTube. - That's very kind of you to say that. If you don't know who Occupy the Web is, have a look at our previous videos, which I've linked below. He's also the author of this book, "Linux Basics for Hackers." Fantastic book if you wanna learn Linux from a hacker's point of view. He's also recently published this book, "Network Basics for Hackers." What I love about his books is he takes subjects like networking, wifi, whichever subject you're interested in, like Linux, and he teaches it from a hacker's point of view. He's also got this book, "Getting Started Becoming a Master Hacker." Really great to have you back, Occupy the Web. What are we talking about today? Because this is a really good topic, I think. - [Occupy the Web] Well, today's topic is how to remain anonymous on the internet. This is a subject matter that is near and dear to my heart. - I've just gotta interrupt you before, 'cause I wanna say this. For everyone who asks, 'cause I get this a lot, I don't know who Occupy the Web actually is. Because you're anonymous to me as well. I don't know your name, I don't know where you live. I kind of believe that you live in the US, but I know almost nothing about you. So you've done a really good job of being anonymous, so I think you're the right person to talk about this. - [Occupy the Web] Ah, thanks. Yeah, I am in the US, so you can tell my American accent that I'm in the US. As a matter of fact, you know, being in the US makes it somewhat more challenging to be too anonymous because we have the NSA who has their fingers into every transaction, every packet that traverses the internet through the US. They don't necessarily have that around the world. They try to have that around the world, but they definitely have it in the US. So all you NSA people out there who're watching this video, we know, we know. We know what you're doing (laughs) and we know that you're looking at every packet, and they know exactly who everybody is. And the NSA folks, they have made it really clear to me that they know who I am. They have actually, you know, they sent me messages saying, "We know who you are." And they do that on purpose because the NSA, they kinda see the internet as their territory and they wanna know everybody who's in their territory. So, trying to stay anonymous from the NSA is really, really hard if you're in the US. It's not as hard in your other countries, but in the US it's really hard because they basically have taps into all the pipelines of all the traffic in the US and they capture every packet and can examine it. If they want to know who you are, then they can find out, so. But if you're in other countries, it's a little bit easier to stay anonymous from the NSA and the other intelligence agencies. But it's really hard to stay anonymous from your own country's intelligence agencies because all of them have taps into the local internet. So let's say this right up front, okay? That it's really hard to stay anonymous from your own country's intelligence agencies. I also want to point out that if you become a target from these intelligence agencies, it's really, really hard to remain anonymous because they have tools that make it really, really difficult to stay anonymous. David, you and I are gonna do a show on Pegasus. - Yeah. - [Occupy the Web] Pegasus is this notorious cellphone hacking software put out by NOS, I mean NSO, (laughs) the Israeli hacking group. And with Pegasus, they can basically just target your phone and take over your phone and then, of course, you're not anonymous. Every message that you send on your phone, all your geolocation services, every message you send becomes captured by the intelligence agency. So, that's a whole different bailiwick of trying to remain anonymous from those guys, 'cause they have capabilities and they have legal sanction to do things that nobody else does. - You're talking offline, there's different levels, right? So you've got like the commercial companies, is that right? And then it, like the NSA is sort of, like, right at the extreme. - [Occupy the Web] NSA is the extreme in the United States because, literally, they're given access to all the pipes and they can see all the traffic and they can trace it, but they don't have that, necessarily, that access in other countries. Some countries they do, but in the US they've been given total access to all the pipes, and so they collect all of the data. They have this big data farm where they put all the data in there and they can basically trace just about, they can trace anybody, and they get metadata off all of the packets and all of the traffic. If you become a target, then they can do even more and get more information about you. - So I mean, some people might be disappointed by what you said because it's like, how do I stay invisible? How do I stay, you know, anonymous? Can I stay anonymous from Google? Can I stay anonymous from anyone? Or as soon as I go on the internet, am I gonna be discovered? - [Occupy the Web] Well, if you're trying to stay anonymous from the commercial interest, that's relatively easy and we can talk about that. The other thing that I find with a lot of people is that they believe that the only way to trace them is through their IP address. So there's this fixation on being able to hide their IP address. There's other ways of tracing your identity other than your IP address. So, if all you're focused on is hiding your IP address, you're gonna be exposed by both the commercial interests and you know, the law enforcement and intelligence agencies. So you have to think about all of the different ways that somebody can trace you. And that's why one of the things that I emphasize is that if you want to remain anonymous and safe, you need to understand forensics, you need to understand OSINT. So if you understand both of those fields and you understand then, what people can do to find you and find your information, then the better off you are in being able to hide your identity and your traffic. - But are you saying that VPNs are, like all these VPN adverts are wrong? You know, if I get a VPN, I'm safe. (David and Occupy the Web laughing) - [Occupy the Web] Well, let's start off by saying one, okay, that you're only as safe as the VPN is safe, right? So the VPN is going to hide your IP address, right? And that's what I was, my point I was trying to make earlier is that there's obsession with the IP address, but- - A whole business has been built on this, or a whole industry. Sorry, I'm just being sarcastic here. - [Occupy the Web] And we're gonna blow it apart, right? Because yes, it's a good measure. VPNs are a good measure, proxies are good measures, Tor are good measures, but there are ways of tracing you, other than just the IP. All of those, okay, are going to hide your IP address, but there's other ways of tracing you other than just your IP address. One of the things you have to keep in mind in trying to remain anonymous is that you can only put up, you know, you can put up hurdles, all right? But it's almost impossible, if an intelligence agency wants to find you, they do. If law enforcement is going to try to find you, they have resources, but they have to expend a lot of resources, if you're good, they have to spend a lot of resources to find you. Now, in general, you know, most people who are navigating the internet are not thinking about anonymity and basically they're giving away all of their information about their entire life to commercial interests like Facebook or Google and others. I don't, you know, I'm not comfortable with that, maybe you are, but- - No, no, no, no. - [Occupy the Web] Yeah. Yeah. And so, one of the things you have to keep in mind is that if you're using Chrome, which is a great browser by the way, Google makes a really good browser and I really love Chrome, but it's constantly sending back all your personal information back to Google headquarters. If you're ever using Chrome, open up, say, Wireshark, while you're using Chrome. And what you'll see when you're using Wireshark is that Chrome is constantly communicating back to Google headquarters everything that you're doing. (Occupy the Web laughing) They're constantly sending back information on you. So when you get an ad that you go, "Gosh, that's amazing. I was just thinking about buying that. How did that pop up on my screen?" Well, that's no mystery because not only are they sending back information about you, but remember we're living in the era of artificial intelligence. And artificial intelligence is not only looking at what you're searching for, but they're trying to create a mind map of you. So what they're doing is that they're saying, "The person who is doing these types of searches is likely, the next thing they're gonna want is this, because that's the pattern that we understand from looking at billions of people in the world, that with these characteristics, they're gonna want this." And... - [David] That's crazy. - [Occupy the Web] They can actually anticipate your needs and send you an ad for it. So if you wanna stay anonymous from those people, that's a little bit easier to do. Now, one of the things is, first off, is don't use Google Chrome. (laughs) 'Cause Google Chrome is owned by Google, right? And it's communicating. Bing is communicating to Microsoft. Even Mozilla is communicating back. 'Cause Mozilla's a little safer than the others, but still, you know, they're communicating back what you're searching for on the web. There's a relatively new browser called Brave, right? That- - [David] Yeah, I use it too. - [Occupy the Web] Yeah, you use it, I use it. That is more anonymous than the others. So that's one of my first recommendations, is get away from using Chrome and Bing and go to- - When you say Bing, you mean one of their new browsers, right? Edge, right? Edge. - [Occupy the Web] Edge. I'm sorry. - Yeah, no worries. - [Occupy the Web] Bing, the search engine. Yeah, Bing is their search engine, Edge is... So yeah, those products are designed to capture information about you. And then once somebody captures information about you, it's pretty easy for them to be able to determine who you are. There's other things that can also be captured, like for instance, there's... Whenever you visit a website, you know, you are presenting these cookies that are in your browser, right? So if there's any cookies in your browser, they are going to appear. And that cookie has identifying information, at least if it's a cookie that has been placed there by Google or Facebook, okay? And both of those companies put cookies in your browser, then it's going to identify who you are, all right? So one of the things you can do with your browser is go to the settings and turn off No Cookies. Now that's gonna make your life a little bit less convenient 'cause that means you're gonna have to log in to every website and nobody's gonna know who you are when you go in. You log into your Facebook account, they're not gonna automatically know who you are and log you in or other services. So it makes life a little more difficult, but it's gonna save your identity. - You would use like, recommend using private browser windows, stuff like that, right? - [Occupy the Web] Private browser windows and just turning off the No Cookies, okay? On any browser that you're using, it's gonna come in different places. It's usually gonna be in Settings, Security, and you can go ahead and click on No Cookies. Cookies are a lot of information. For those of you who aren't familiar with cookies, cookies is basically a text file that has information about who you are and what your interests are. It may actually include things like your username and password. This is a, as you traverse the internet, these cookies can be presented to other people, other websites. So people are focused on IP addresses. But remember, for somebody to identify you by IP address, they actually would have to get into the ISP or the VPN to get their records, their log files to identify you. IP addresses are something to be concerned about, but these other issues are equally important in terms of trying to maintain your anonymity on the internet. One of the things that I'd like to show you here, let's go into Kali. And talking about IP addresses, one of the things that is available to us in Kali and other places is what's called proxy chains. So proxy chains is a tool that uses multiple, it can use a single proxy or multiple proxies, okay? To be able to hide your IP address. So let's go, just hiding your IP address, we're going ahead, let's open up a terminal in, I've got some, let's open up a new one here. There's a tool in Kali that allows you to use proxies. It's called Proxy Chains. So you can just go proxy chains, it's built into Kali and others. Not just Kali, but there's Parrot and Arch Linux and a number of others have proxy chains built into it, as well. The key to using proxy chains is simply to set up the configuration file in Linux. You know, every configuration file is simply a text file. All you have to do is go into the text file to be able to edit it. So let's go and look at the proxy chains configuration file. Let's see, I'm gonna use that mousepad, which is built into Kali. It's a gooey based versus Vim. And we're gonna go, is that etc proxy, if I remember? Where's that? proxychains.com. Nope. It's not there. We'll close this. Yeah. Okay. Let's go to cd, etc, and we'll go to... Etc is where most of the configuration files are in Linux. And you go up to, you'll see up here, proxy chains 4. That's what I had wrong. It's four. So we're gonna go up arrow here, let me clear my screen. All right, so then we're gonna go mousepad, proxy chains four, and then look at that. All right. All right, here we go. This is the configuration file for proxy chains. What proxy chains will do is it'll allow you to select proxies that will then take your traffic and move it through a proxy, hiding your IP. And you can even send it through multiple proxies. As you can see here, there's all of this up here is basically comments describing what they do. The option below identifies how ProxyList is treated. You can have a dynamic chain, where each connection will be done via chain proxies. A strict chain, okay, which is what I have uncommented. So we'll just use a strict chain, initially. Here's a round robin chain. Each connection will be done via chain proxies at the chain length, which is a variable. You can set the chain length. There's a random chain. Each connection will be done via a random proxy. All right. Here's a chain length, by default it's set to three. And then if we scroll down a little further, we'll see there's a number of other variables here. Here's the ProxyList format. It's gonna look like this. Socks5 and then the port number and if there's a username and password. Okay, http, these are all local IP addresses, so you know they're really, those aren't ones that you'd want to use. All right? What I've done, and usually it's set by default within Kali, in this proxy chains is using the socks5 and then using 127.0.0.1, your local host on 9050. This is Tor. As you know, Tor is the special and separate network of routers, okay? That encrypts your traffic from hop to hop to hop. Tor was originally developed by the US Navy so that they could go ahead and navigate anonymously. It's now an open source project. We do know that there are some issues with Tor, where it's not totally anonymous. Institutions and intelligence agencies like the NSA can still crack Tor, but it's still pretty effective for what we want to do here. So let's go ahead and try it out. Just using Tor as our proxy chains. You can go ahead, once you set those major settings, go ahead and save and then close it. And now, what you need to do is to go ahead and start Tor. All right? So you can go sudo system control, start Tor or enable Tor. So Tor should be running now in your system. Then let's go to proxy chains. You can't use sudo because Mozilla doesn't like it. And then just go Mozilla. And now what this says is it runs proxy chains and then runs Mozilla, Firefox. I guess it's actually Firefox is the, Mozilla's the name of the project. Firefox is what it is. And there we go. - So what you've done now is you've started Firefox as a browser, but going through Tor network, right? - [Occupy the Web] Right. I'm running my Mozilla Firefox through the Tor network. You can see it in the background here. Let's kind of see if we can get both of those online here. All right. You can see it's running through a strict chain. It tells us right here, strict chain, which means that it's only, it's going to go through all of the proxies that you've listed. In our case here, we've only listed one, we've listed the Tor network. And then let's go and let's go to Hackers Arise. - [David] I hear it's a good website. - [Occupy the Web] I hear it is too. Yeah. Lots of good information there. - [David] That's right. - [Occupy the Web] Right. So you can see that it's going through and it's anonymizing my traffic coming through the Tor network. So we could use both, there is a separate Mozilla, or not some Mozilla, a Tor browser, or we can use the Mozilla built in to Kali and just send it through the Tor network. Let's check our IP on this. Okay, let's go, what's my IP? - [David] Yeah, you live in Amsterdam now, right? - [Occupy the Web] Amsterdam. Okay, Amsterdam is where it's at. That's my location. Let's go and refresh again. Let's see if we can get a different Tor router. And this one's still same IP. - [David] Yeah, you're still in Amsterdam. - [Occupy the Web] Sometimes you can go ahead and just refresh it and it'll jump to another IP. Let's see if we can get another IP out of it. You can see how slow it is. This is one of the drawbacks to using Tor. Some of the commercial proxies will run a lot faster. I think I've told this story before, that when I was doing some work in Washington DC, I was doing a training of FBI, a few years back and I thought it'd be funny that when everybody was out at lunch, that I was going to go ahead, and this was when the Silk Road was still up and running, I said I had the Silk Road up on the screen as they walked in from lunch. And they had all the drugs for sale. - Ooh. - [Occupy the Web] So they came back from lunch and I had the Silk Road up on the screen. You can tell this has been a while, 'cause the Silk Road's been down for a while. But of course there's other sites now that do the same thing on the dark web. And I said, "Okay, you guys, what are you gonna do about this?" And they said, "That's not our problem. That's drug enforcements." And interestingly, if you know the story, that it actually was the FBI that took down the Silk Road, even though their response to me was, "No, that's not our job. That's drug enforcement." - And didn't you say something along the lines that it was actually very fast because it looked like you were using one of the local nodes or something? - [Occupy the Web] Exactly. So I did tell the story here before. Yeah. So I'm in Washington DC and I'm like, "Gosh, you know, it's so much faster in Washington DC." And that was before I knew that the NSA had nodes all around the Washington DC, so that it was running just as fast as my regular internet would in DC because they've got nodes distributed all over DC to make sure that they can see all the traffic. Interestingly, if you've watched the "Mr. Robot" series, in the very first episode, Elliot is able to, he goes into a coffee shop, it's like Dan's Coffee Shop or something like that. And it turns out that Dan is actually running a (bleep) server from his coffee shop and Elliot discovers this and confronts him with this information and he's like, "How do you know that?" You know, how can you, he said, "Well, because your internet is so fast, that I always come here to use your internet. And then I began to wonder why is it so fast?" And so, and he put up a node on the Tor network and was able to see the traffic going to his server and then got into the server and saw that was all... (bleep) So that was episode one. And that's an important lesson. And Elliot says, "Whoever controls the final hop on the network, controls the traffic." - The Onion Rooting Protocol, it's not as anonymous as you think it is. Whoever's in control of the exit nodes is also in control of the traffic, which makes me the one in control. - [Occupy the Web] And that's the same thing that the NSA knows, is that they know whoever controls the final hop, controls the network. So he did the same thing. It's easy, you can set up a router on the Tor network easy enough. You just go to the website and they have the software you can download and put yourself as a router on the Tor network. - So this the problem, you're telling us about Tor, but we could be still compromised, right? - [Occupy the Web] Yeah. - Because the NSA could have like exit nodes. - [Occupy the Web] Exactly. Whoever has that last exit node controls the traffic. I'm gonna go refresh it one more time and see if we... It's still sending me back to Amsterdam consistently. I'm gonna go, let's stop it and try connecting again. And let's see if we can't get a different IP address. There we go. And let's go. What is my IP? So it's coming out with sockets here or timeouts whenever I go there. Let's go to Google again. Right here. Let's go what's my IP and see if we get a different IP this time. Here we go. Detecting. Should get a different IP. Just gimme the IPv6 but not the IPv4. Yeah, have at least. Well this would actually be best, right? If the IPv4 is not detected, but it does have the IPv6 and still working on it and still comes back with Not Detected. So you could make the case that that's even better. - [David] Yeah. - [Occupy the Web] that's not detecting it, but I think it's basically the website is the problem and not that the IP address is not no. Okay, so I'm gonna go ahead and shut this down. I'm gonna go ahead and shut down our proxy chains. One of the other things that I wanted to show is that there's actually a tool called a non surf that you can install on your Kali that will automatically send all your traffic, okay, through Tor. So let's go there. Okay, we've got it installed now. All right, so now we've got a directory called Kali anonsurf. Let's just take a look and see where it's at. All right, here's Kali anonsurf right here. Let's go into that directory. Okay, let's take a look inside there. There's the installer. And then we gotta run sudo installer.sh. (fast forward sound effect) Gives me errors while processing, let's see if we can get it to run. Okay. So, sudo anonsurf. Start. There it is. We're running anonsurf, okay? You can see it's killing dangerous applications, cleaning some dangerous cache elements, stopping IPv6, starting anonymous mode, saving IP tables rules, modified resolv.conf to use Tor and private internet access DNS, all traffic goes redirected through Tor and you're under an AnonSurf tunnel. So now, what happens is that everything you do on this operating system is gonna go through the Tor network. It's gonna be a little bit slower, but it's gonna give you better anonymity than it would otherwise. So, your IP address is gonna be hidden, except from the person who has the exit node on the Tor network. And hopefully that's not the NSA or the law enforcement. So a couple of the things that we want to talk about, we talked about using, you know, a browser like Brave, okay? That's not, and not collecting cookies, along cookies on your browser. One of the things that people often ask me about is what's the safest operating system? And there's a number of 'em that are out there that, you know, all of 'em pretty much are using the Tor network to make you more secure. I found that using Kali, using the anonsurf, it actually works pretty good, pushing everything through the Tor network. The other issue that people often ask me about is, how about using a phone, right? Isn't a phone a major vulnerability trying to remain anonymous? - [David] Androids. - [Occupy the Web] Whether it be Android or Apple, because both of them can be hacked by Pegasus, right? And so one of the things about your phone is that you probably don't want to use your actual phone whenever you're doing anything that where you wanna remain anonymous, because the data that's collected from your phone is all available to law enforcement. They can trace your geo location, they can see your messages. One of the things that I recommend is to go out and buy a burner phone. A burner phone is simply a phone, it can be a cheap phone. If you go into some of the phone stores, you can buy these phones that are inexpensive. I think I've bought some of 'em as little as $20, $30 and put them on a pay-as-you-go contract, where you pay cash for them. And then that's really, really difficult to trace, right? There's no way to connect that phone to your identity. And so, then you can go ahead and make your calls, send your messages from that phone. One of the things you want to keep in mind, though, is that when you go to buy that phone, that you're not traveling with your other phone in your pocket because you can be then traced to the purchase of that phone, okay? Because every one of your steps is being followed. Whenever you're traveling with your phone, there's always geolocation that's available because your phone is connecting to the cell phone towers and from the cell phone towers they get your location. Now, it's not as precise as GPS, but still, they can tell if you're going into a store to buy the phone, they can trace you that close. So don't take your phone with you, all right? Go buy your burner phone, use your burner phone for anything you wanna remain anonymous. Do not do any of the same things on your usual phone, your normal phone, as you would do on your burner phone. Do not go to the same websites, don't go use the same browsers. And so that's kind of the rules of thumb for using a burner phone. Ultimately, if you really want to remain anonymous, I recommend using two separate systems. This is, if you can afford it, this is probably the best way to go. Of course, you know, you could have two separate internet services, all right? Or you know, if you can hack your neighbor's wifi, you can use their internet service. - I'm not recommending that you do that. But someone like... - [Occupy the Web] No, no, I would never recommend that. I'll never recommend that. No. And then you could use somebody else's IP address maybe. But keeping your activities separate, in two separate systems is going to be one of the safest things that you can do. 'Cause you're using a different browser, you're using different operating system, you are using a different IP address, so they can't be connected back to you. One of the things I also do is that I create false profiles. I put false information out on the internet so that that information doesn't lead back to me. People try to connect that information to me, but it really is false information that's going to be, you know, there's breadcrumbs out there that somebody's gonna follow and it's gonna take them to the wrong place. And if they follow all the breadcrumbs, it's gonna take them to separate identities. This is the kind of work that you need to do to truly remain anonymous because there's an awful lot of information that's out there about you from OS in-sources, from your cookies, from your IP address. And to really remain anonymous, it's like a full-time job. You have to think about everything that you do on the internet and whether or not it's going to leave a trace back to you. - Is it safe for me to use an ISP or are there certain ISPs that you recommend? I think Starlink was one that we've kind of mentioned in the past. - [Occupy the Web] Well, I use Starlink. And I use Starlink primarily because their IP addresses are not geo-located, right? So if you go and somebody looks at your IP address, all it's gonna do is it's gonna take 'em to a regional office of Starlink. So I find Starlink to be, just create one more level of anonymity into your traffic on the internet. It just, all it's gonna do is gonna say, "Hey, it's a Starlink IP address." Now, if Starlink wants to give up your identity, then that's a different thing. Or if Starlink gets hacked, then your identity can be resolved from that. But most, ISPs distribute IP addresses by location, right? So, somebody can find out what city you are in. Not with 100% accuracy, but pretty close to it. What city you're in simply by your IP address, knowing there is these databases of IP addresses and cities. So, I would say to create one more level of anonymity, I like Starlink. And then run Starlink, say, through proxies or VPNs or Tor. - So, a great thing about Starlink is you can often buy this mobile solution, can't you? So you could drive around and you know, doesn't matter where you are, you could take it with you and then you could access the internet from different physical locations. But I like what you said there, because if I use internet at my house as an example, and it's a fiber link or something like that, I mean it's tied directly to my house. It's very easy to find me, right? - [Occupy the Web] Exactly. But with Starlink I could be anywhere. - [Occupy the Web] Starlink allows you to be mobile. They charge an extra $25 a month that gives you mobile. And so the satellite dish can move around. It, automatically, unlike some of the old satellite technology where you were fixed on a single satellite, in Starlink they have thousands of satellites and the dish is smart enough to find the closest satellite. So as you're moving, it goes and finds the closest satellite to you. Makes it much harder to be able to geo-locate you when you're using Starlink. - So I mean that's at least like, I'm trying to think in layers. Okay, so, how do I get to the internet? I could use Starlink, I could for instance go to McDonald's or somewhere else and get onto the internet that way, but then I've gotta sit in a cold train station or somewhere, you know, get onto the internet somewhere, somehow. But least with Starlink, I've got something with me that I can take around. - [Occupy the Web] Yes. Yeah, you can. If you're, you can put it in your vehicle. (laughs) You know, if you're traveling, you can take it with you and it will automatically connect and there's nothing, there's no geolocation that's assigned to it. Although, now you have to pay for with a credit card. So your name is still linked to that IP address. If somebody gets inside of Starlink or Starlink gives up your information. Now so, you know, Starlink is an American company, as we all know owned by Elon Musk. If Elon Musk wants to give up the information about you, then you're still not anonymous. - But at least it's one layer. - [Occupy the Web] It's one layer. And that's what you think about, you're right. Gotta think about layers. - Layers! - [Occupy the Web] Right? This is one layer that makes it just a little bit more difficult to identify you. - Next one, and this is always a question people have. Do I use a Windows computer? Do I use Apple, do I use Linux? Or you know, Apple, Windows seem to both have a lot of, like, data that they pull from you, telemetry data that they pull from you. A lot of people don't trust them. So perhaps Linux is the best. - [Occupy the Web] Well, I obviously would recommend Linux. One of the things that both Apple and Microsoft do is that they put in user IDs, a GUID into documents. And so that if you're creating a document and you're distributing that document, it can be traced right back to your computer. One of the things I recommend is do not use Microsoft Word or the whole suite of Microsoft products because they'll pull the globally unique ID off the machine and put it into the document. This is where forensics becomes really critical. So, you know, if you're a forensic investigator, you know that. You know that there's a globally unique ID on that Word document. So if you're trying to trace somebody, you can pull that globally unique ID. It's not going to have geolocation data in it. But once your machine is identified, they can say that this document came from this machine. - Is it safe enough to use a virtual machine or should I have a dedicated physical machine that runs Linux? - [Occupy the Web] Physical machine creates one more layer. If you're gonna run multiple machines, I would recommend one, one machine that you're doing stuff that you don't wanna be traced on and one machine that you're doing everything else on. If you can afford that. If you can't afford that, I would say run a Linux machine in a virtual machine such as VirtualBox or VMware workstation. - It's all about, like, cost versus what you're really trying to accomplish, right? So I mean, if you really want to go hardcore, you gotta spend the money to do something like that, I would say. Yeah? - [Occupy the Web] Yeah. If you wanna really make sure that you're not gonna be traced, you want to go and spend a little bit of money, possibly have two systems, you know, one of one that you're only doing the work, you're gonna have a separate identity for each machine, right? And you can create separate identities and not have them be connected in any way, shape or form. - So like, we mentioned stalling. So as an example, I could have like an internet connection at home, that's my normal internet, let's say fiber, whatever. And then I have a Starlink, which I do all my anonymous stuff on and then I have like a Linux machine that I use for my anonymous stuff and then perhaps whatever operating system I like for my normal stuff. - [Occupy the Web] Exactly. - What about phones? Because, like, they all seem to be, you know, choose the worst type. It's like, is it iOS, is it Android or do I have to go and use Graphene or something like that? - [Occupy the Web] You know, that's a good question. Basically the most important thing I think is simply have a phone that isn't linked to any carrier. Right? - [David] Yeah. - [Occupy the Web] So any carrier in any credit card. Because once you've linked a credit card, you pay for it by credit card or have a service through any one of the major carriers, then you can be traced. These burner phones that you can buy for cash. You can pay for them with cash, the service for cash, month to month, the service with cash, that's really the only way to remain, to make certain that you're gonna remain anonymous. And like I said, they should not be in the same location, right? At the same time, right? If if they're in the same location at the same time, one of 'em has to be turned off, because once they're in the same location, then they can be tied together to your location and your identity. - So in other words, Graphene by itself wouldn't be enough. You'd want to buy a burner phone with cash or something, 'cause it's not the operating system that's the problem, it's the fact that it can be traced to you. Right? - [Occupy the Web] Exactly. Exactly. That's, I agree. What I feel safest with is simply using a burner phone. Right? That's why I feel confident that can't be traced. - And what about VPN versus Tor? There's this, there's always good, argument on YouTube and you know, on the internet and that's why it's great to get your opinion, 'cause you're well experienced in this, should I use a VPN, like X, Y, Z VPN? Or Should I use Tor? Or should I use Tor over a VPN? Or you know, what would you recommend it? - [Occupy the Web] It all depends upon, you know, how much protection that you want. VPN for the average individual who's trying to protect themselves from commercial services, VPN generally are gonna be pretty good. But remember that you're putting your hands, you're putting your life, maybe, into the hands of the VPN developer. They have all of your information. If they get hacked, right? And they do get hacked, then all of your information is available. So, that's a trust that you have to place in them. So for the average user, a VPN's gonna be fine. If you're working in cyber warfare, where your life is dependent upon remaining anonymous, that may not be adequate. In that case, in a cyber warfare environment, where your life is dependent upon remaining anonymous, I would prefer either proxies or the Tor network. Proxies can pose an additional problem, once again, that they can be hacked as well. I would never trust a free proxy. All right? Because why would somebody put up a free epoxy? Why would somebody put out a proxy- - 'Cause it's the NSA. (laughs) - [Occupy the Web] What's that? - It's because it's the NSA. - [Occupy the Web] Yeah. Because the NSA. Exactly. Or it's a GRU or whoever. So remember that the NSA, the GRU, all the intelligence agencies, one of the things that they want to know is everybody's identity. They know that people use proxies. So their job is to figure out who you are and what you're doing. If you were them and your job was to find that out, wouldn't you put up, "Free proxies, here! Connect to our free proxy! And of course we keep no logs!" And of course that's what they advertise and that way they can at least get some of the traffic going through their proxies. It doesn't make any money. So they have no business model to, if there's no legitimate business model to keep 'em safe. If somebody's putting up a free proxy, there's no legitimate business interest to keeping you safe. As a matter of fact, there's an interest in keeping you unsafe and selling your data. So I recommend, if you're gonna use a proxy, use a commercial proxy, where you're paying somebody to keep you safe. - So let's take it to the extreme. I mean, let's say you want to, your life depends on it. You're a journalist or someone who's involved in cyber warfare, something like that. You really want to keep yourself safe. So if I understand correctly, you're gonna have two infrastructures, one for like normal and then one for anonymous stuff. So Starlink or whatever it is, separate infrastructure, separate laptops, separate phones, burner phones. You're gonna buy that with cash if you can. You're gonna use proxy chains or you're gonna use Tor, something like that. Is that right? Anything else that I've missed? - [Occupy the Web] No, I think that that pretty much covers it. You just wanna make sure that when you're using those two separate systems, that they do not intersect. The sites that you visit, the things that you do, the information that you provide do not intersect. Because that intersection can be detected by people who are trying to determine your identity. - Do I need separate homes or separate locations? Like do like you said the phone. I mean, I'm just trying to think, like you said, don't put the two phones together, right? So I'm gonna have to put that in- - [Occupy the Web] Don't put two phones together on, okay? - [David] Okay. - [Occupy the Web] I mean, you could put one of 'em in a Faraday cage. Okay? Just so that the location doesn't show, the geolocation services don't show them being in the same location. Because once you've revealed that, so for instance, you have an Apple phone and you've got a burner phone and they're both sitting in your office and they're both on, right? They're both showing that they're in the same location. You've suddenly given away your identity as the person who owns the iPhone, right? That burner phone has been now been linked to that iPhone. - So you put the burner phone in a Faraday cage or you leave it somewhere else and you don't bring it to your home where you do your normal stuff. - [Occupy the Web] Or you just turn it off. - What I really appreciate about Occupy the Web, for everyone who's watching, is he doesn't, it's not sensationalist nonsense. He's giving you the, you know, really good information. So Occupy the Web, thanks for doing that. - [Occupy the Web] Of course. Anytime David. - So Occupy the Web, another one we didn't touch on is email. Do you have any email providers that you could recommend for secure email? Because email seems to be one of those things that's, it's easy to find people. - [Occupy the Web] Yes, email can easily be traced. And so, one of the things that I like and those people who have worked with me and been my students or in some way associated know that I use ProtonMail. ProtonMail is the only one that I feel comfortable with. They are based out of Switzerland. It's end-to-end encryption. You might ask yourself, "Well what difference does it make that they're in Switzerland?" Well, the Swiss have particular laws that protect people's privacy more than even the EU does, or certainly the US does. 'Cause the US doesn't really have any good privacy laws at all. Switzerland has long had the history. That's why there are these Swiss bank accounts, right? Because the Swiss have special laws of protecting people's privacy. Even if you have end-to-end encryption and the encryption in a service, then if the servers get compromised or law enforcement shows up, that's often what happens. Law enforcement shows up and says, "We think that, you know, we need to have the data from your servers." That's not gonna, that's less likely to happen in Switzerland than it is in other countries. It's happened in the US, it's happened in Germany, it's happened in Australia where law enforcement shows up and wants the records. Canada, where law enforcement shows up. We want the records and therefore that all of your email and all of your communication is then compromised. Switzerland has laws that protect privacy that's more strict than other nations do. And ProtonMail, I've been using them for, I don't know, almost, I actually got one of the beta accounts at ProtonMail when they first opened up. You had to actually ask for an account and you had to wait like three or four months to get an account. So I've been with them a long time and I have a lot of confidence that they're gonna do as good a job as possible to protect my information. There's a number of others that are out there as well, including Mailfence, PrivateMail, AnonAddy, Guerrilla Mail, Sekur Mail, what have you. Those are all out there as well. As far as secure operating systems, some of the hardened operating systems include Qubes, Subgraph, HardenedBSD, are all good choices if you want a hardened and safe and secure operating system. One of the things I do wanna mention before we finish here, and that is that a lot of people believe that making transactions in Bitcoin is untraceable and that's not true. All right? As a matter of fact, I have a class coming up, I think it's in December, on how to trace Bitcoin. If you're trying to remain anonymous and you're using Bitcoin, Bitcoin is traceable. It's not easy to trace, but it can be traced. So it's not gonna maintain your anonymity. But also remember that maintaining anonymity is a matter of throwing up a lot of roadblocks to the people trying to trace you. So the more roadblocks that you can put up, then the harder it is to trace you. But Bitcoin, a lot of people believe that they can simply purchase thing with Bitcoin and be safe. Now, some of the other cryptocurrencies have better anonymity than Bitcoin does, so. And that's one of the things that I think we're gonna talk about in the future. - That'd be great. I could do a video on that, too. And everyone who's watching, please put in the comments below, would you like to see a video on Occupy the Web showing us how to trace Bitcoin transactions? - [Occupy the Web] One other thing we wanna talk about is anti forensics. I have a class coming up this summer on anti forensics. First of all, I recommend, if you wanna remain anonymous, that you study forensics and OSN. But after you've studied it, then you have to focus on how can I keep the information off my machine? This includes cleaning off any files off your system. As we know, that if you delete a file on your system, it still is there. So you have to overwrite files on your system and then, of course, you want to clean your bash history or wherever you're entering your commands. - What would you say to people who say that the only way to do operating systems is to run it in RAM? So you boot off a USB or something and it's all in RAM and then when you finish you pull that out and it's all gone. - [Occupy the Web] Well, I think that's a really good idea. That's certainly an option, is to simply run your operating system all in RAM, say off a flash drive, and then once you've taken the flash drive off, it means it's gone. I mean it is still possible. Well, if you reboot the system, everything is gone and nearly everything's gone from RAM. 'Cause there's, still, forensic investigators can still pull some information from RAM, even after you've rebooted the system. Remember also that operating systems, when the RAM is full, it begins to right to the hard drive, right? There's swap files. So the strategy is a good one, but it's not 100%. That's my point, right? None of these strategies is 100%, but if you put up enough of these anonymity strategies, the safer you're gonna be. - We spoke about, like, buying a separate laptop or something for running Linux on, but you could perhaps boot into RAM on that laptop if you just want to, you go to the next level. So it's just like layers and layers and layers of... - [Occupy the Web] Right. - Anonymity, right? - [Occupy the Web] Yeah, the more layers you put in, okay, the safer you are. My thing that I emphasize to nearly everybody is that if somebody with enough skills and enough knowledge and enough resources wants to find you, they can. But that's key. Enough resources, enough time and enough skills, they can find you. But, most people don't have unlimited resources, unlimited time and unlimited skills. What you want to do is make it as difficult as possible. But if you really need to remain anonymous from, say, the intelligence agencies, that's a really, really difficult job. If you want to remain anonymous from the commercial interests or your next door neighbor, that's a little bit easier to do, than it is from the intelligence agencies. They have a huge amount of resources and high level of skill. - Occupy the Web, another one that comes up a lot, search engines. Google's tracking you like crazy. What about DuckDuckGo? Some people say bad things about them. Do you have any favorite search engines? - [Occupy the Web] What I would prefer, okay? Is to use DuckDuckGo in Brave, all right? The Brave browser. Google is probably the worst in terms of tracking your information. So, Google Chrome is a great browser. I love Google Chrome, but they track everything that you're doing. So I would recommend using DuckDuckGo in Brave to remain safest, to have least amount of information. But once again, remember, that even then you wanna be able to have two separate identities, so that what you're searching for in DuckDuckGo is different than what you're searching for in Google or other places. So the two cannot be connected. - I love what you said, here, because in this interview you kind of like, putting emphasis on have different identities, like, have everything separated. A lot of people, I think, make the mistake that they use the same devices or go to the same websites when they're trying to be anonymous and when they're just normally surfing. And I'm glad that you've really highlighted that. So, a technical solution isn't the answer to everything. It's like make sure that you separate your behavior, I feel like. - [Occupy the Web] Exactly. And also, one of the things that I do is put out false information. - [David] Yeah. - [Occupy the Web] So, I leave behind false information that will take people to other identities, so that when they're trying to trace me, all of 'em are not leading to the same identity, they're leading to multiple identities. And that can at least obscure and make it more difficult to find you. - Occupy the Web, as always, I really wanna thank you for sharing your knowledge and experience with all of us. You know, you've got many, many years of experience and you are anonymous online even though you write books. You share so much information. So thanks for sharing your warnings and your tips with all of us. I really appreciate it. - [Occupy the Web] You're welcome, David. I always enjoy being on your show and look forward to doing more of these with you in the future. - So just for everyone who's watching, ideas that you've got, let us know in the comments, ideas would include Pegasus, talking about that. What other ones did we think about? Bitcoin, right? - [Occupy the Web] Bitcoin forensics. Yeah. - What about, like, wifi hacking? That would be a good one. Bluetooth I think is another good one. And we definitely wanna have "Mr. Robot," right? - [Occupy the Web] And we'll do more with "Mr. Robot" as well. - So for everyone watching, please put your comments below, things that you'd like to see. Occupy the Web, thanks so much. - [Occupy the Web] Thanks, David. See you soon.
Info
Channel: David Bombal
Views: 475,005
Rating: undefined out of 5
Keywords: wifi, tor, mr robot, nsa, proxy chains, proxy chain, anonoyous, vpn, linux, tails, cubes, anonymous, hack, how to browse the internet anonymously, how to browse the web anonymously, how to be anonymous on the internet, invisible online, hide identity, privacy, cyber security, kali linux, ethical hacking, how to be anonymous, browse the internet anonymously, browse the web anonymously, online privacy, online privacy tips, brave browser, duckduckgo, hide online, hidden identity
Id: LEbAxsYRMcQ
Channel Id: undefined
Length: 53min 16sec (3196 seconds)
Published: Sun May 14 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.